Tails 1.4 is out to preserve your privacy and anonymity

The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user privacy and anonymity.

The Debian-based distribution Tails, “The Amnesiac Incognito Live System,”version 1.4 is available online! Tails is a popular live operating system (that means that users can start it on almost any computer from removable devices like a DVD, USB stick, and SD card) designed to preserve user privacy and anonymity.

The popular live Linux distribution is used by the famous whistleblower Edward Snowden, just released version 1.4.

This Debian-based system is designed to preserve your privacy and anonymity online, providing better protection than just using the Tor browser alone on a typical operating system. Tails includes a set of tools to protect the user anonymity, such as the Tor Browser and the I2P anonymizing software. The Tails live OS is designed to route all the user traffic over the Tor network to prevent applications from leaking it.

 

The Tails ability to boot and run from a disc, USB drive, or SD card ensures no traces of a user’s activity remain on the local host hard drive and registry, this means that it could also run on an untrusted computer. Another point of strength for the Tails live distribution is the impossibility for spyware to run infect the Tails OS.

Theoretically the unique possibility for an attacker to spy on a Tails session is to use a malicious implant at firmware level on the targeted host.

Tails use other privacy software like KeePassX password manager, Electrum BitCoin wallet, Pidgin, and disk-wiping and encryption tools.

Pidgin for example, is a free chat client used by to connect to AIM, MSN, Yahoo, and more chat networks all at once. The version installed in the Tails 1.4 version comes with the Off-the-Record plug-in for encrypted chatting. You’ll also find software like the KeePassX password manager, Electrum BitCoin wallet, and disk-wiping and encryption tools.

What’s new in Tails release 1.4?

Of course, the new Tails 1.4 includes the new Tor Browser version 4.5, and fix numerous security issues as reported in the Tails 1.4 release notes.

Among the issues resolved in the Tails 1.4 release there, is the browser theme of the Windows 8 camouflage that has been made compatible with the I2P and Unsafe browsers.

The new version support for more printers, and better support for Vietnamese fonts in LibreOffice, and includes a Tails OpenPGP Applet that has a shortcut to the gedit text editor.

“Tails, The Amnesic Incognito Live System, version 1.4, is out,” was stated in the official release announcement for Tails 1.4. “This release fixes numerous security issues and all users must upgrade as soon as possible. […] There are numerous other changes that might not be apparent in the daily operation of a typical user.” states the Tails 1.4 official page. 

The new release includes Paperkey that is a tool that allows users to print a backup of their OpenPGP secret keys on paper.

Tails 1.4 also removes the obsolete #i2p-help IRC channel from the Pidgin multi-protocol instant messaging client and disables the new circuit view of the Tor Browser 4.5 application.

Let me suggest to read the about page and warnings before starting use the Tails 1.4.

Pierluigi Paganini

(Security Affairs – Tails 1.4, anonymity)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

9 hours ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

14 hours ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

18 hours ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

21 hours ago

Linux variant of Cerber ransomware targets Atlassian servers

Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…

1 day ago

Ivanti fixed two critical flaws in its Avalanche MDM

Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can…

2 days ago

This website uses cookies.